local.go 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. // Copyright (C) 2019 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package kms
  15. import (
  16. "context"
  17. "crypto/sha256"
  18. "encoding/base64"
  19. "encoding/hex"
  20. "io"
  21. sdkkms "github.com/sftpgo/sdk/kms"
  22. "gocloud.dev/secrets/localsecrets"
  23. "golang.org/x/crypto/hkdf"
  24. "github.com/drakkan/sftpgo/v2/internal/util"
  25. )
  26. func init() {
  27. RegisterSecretProvider(sdkkms.SchemeLocal, sdkkms.SecretStatusSecretBox, NewLocalSecret)
  28. }
  29. type localSecret struct {
  30. BaseSecret
  31. masterKey string
  32. }
  33. // NewLocalSecret returns a SecretProvider that use a locally provided symmetric key
  34. func NewLocalSecret(base BaseSecret, _, masterKey string) SecretProvider {
  35. return &localSecret{
  36. BaseSecret: base,
  37. masterKey: masterKey,
  38. }
  39. }
  40. func (s *localSecret) Name() string {
  41. return "Local"
  42. }
  43. func (s *localSecret) IsEncrypted() bool {
  44. return s.Status == sdkkms.SecretStatusSecretBox
  45. }
  46. func (s *localSecret) Encrypt() error {
  47. if s.Status != sdkkms.SecretStatusPlain {
  48. return ErrWrongSecretStatus
  49. }
  50. if s.Payload == "" {
  51. return ErrInvalidSecret
  52. }
  53. secretKey, err := localsecrets.NewRandomKey()
  54. if err != nil {
  55. return err
  56. }
  57. key, err := s.deriveKey(secretKey[:], false)
  58. if err != nil {
  59. return err
  60. }
  61. keeper := localsecrets.NewKeeper(key)
  62. defer keeper.Close()
  63. ciphertext, err := keeper.Encrypt(context.Background(), []byte(s.Payload))
  64. if err != nil {
  65. return err
  66. }
  67. s.Key = hex.EncodeToString(secretKey[:])
  68. s.Payload = base64.StdEncoding.EncodeToString(ciphertext)
  69. s.Status = sdkkms.SecretStatusSecretBox
  70. s.Mode = s.getEncryptionMode()
  71. return nil
  72. }
  73. func (s *localSecret) Decrypt() error {
  74. if !s.IsEncrypted() {
  75. return ErrWrongSecretStatus
  76. }
  77. encrypted, err := base64.StdEncoding.DecodeString(s.Payload)
  78. if err != nil {
  79. return err
  80. }
  81. secretKey, err := hex.DecodeString(s.Key)
  82. if err != nil {
  83. return err
  84. }
  85. key, err := s.deriveKey(secretKey[:], true)
  86. if err != nil {
  87. return err
  88. }
  89. keeper := localsecrets.NewKeeper(key)
  90. defer keeper.Close()
  91. plaintext, err := keeper.Decrypt(context.Background(), encrypted)
  92. if err != nil {
  93. return err
  94. }
  95. s.Status = sdkkms.SecretStatusPlain
  96. s.Payload = util.BytesToString(plaintext)
  97. s.Key = ""
  98. s.AdditionalData = ""
  99. s.Mode = 0
  100. return nil
  101. }
  102. func (s *localSecret) deriveKey(key []byte, isForDecryption bool) ([32]byte, error) {
  103. var masterKey []byte
  104. if s.masterKey == "" || (isForDecryption && s.Mode == 0) {
  105. var combined []byte
  106. combined = append(combined, key...)
  107. if s.AdditionalData != "" {
  108. combined = append(combined, []byte(s.AdditionalData)...)
  109. }
  110. combined = append(combined, key...)
  111. hash := sha256.Sum256(combined)
  112. masterKey = hash[:]
  113. } else {
  114. masterKey = []byte(s.masterKey)
  115. }
  116. var derivedKey [32]byte
  117. var info []byte
  118. if s.AdditionalData != "" {
  119. info = []byte(s.AdditionalData)
  120. }
  121. kdf := hkdf.New(sha256.New, masterKey, key, info)
  122. if _, err := io.ReadFull(kdf, derivedKey[:]); err != nil {
  123. return derivedKey, err
  124. }
  125. return derivedKey, nil
  126. }
  127. func (s *localSecret) getEncryptionMode() int {
  128. if s.masterKey == "" {
  129. return 0
  130. }
  131. return 1
  132. }
  133. func (s *localSecret) Clone() SecretProvider {
  134. baseSecret := BaseSecret{
  135. Status: s.Status,
  136. Payload: s.Payload,
  137. Key: s.Key,
  138. AdditionalData: s.AdditionalData,
  139. Mode: s.Mode,
  140. }
  141. return NewLocalSecret(baseSecret, "", s.masterKey)
  142. }